Close Menu
TechurzTechurz
    What's Hot

    This young startup is taking on a fragrance industry that hasn’t changed in a almost half century

    May 21, 2026

    Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement

    May 21, 2026

    Beauty booking startup Fresha hits $1 billion valuation with KKR backing

    May 21, 2026
    Facebook X (Twitter) Instagram
    Tech Pulse
    • This young startup is taking on a fragrance industry that hasn’t changed in a almost half century
    • Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement
    • Beauty booking startup Fresha hits $1 billion valuation with KKR backing
    • General Catalyst just led a $63M bet on India’s travel payments market
    • Clouted wants to take the guesswork out of making short videos go viral
    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    TechurzTechurz
    • Home
    • Tech Pulse
    • Future Tech
    • AI Systems
    • Cyber Reality
    • Disruption Lab
    • Signals
    TechurzTechurz
    Home - News - Be careful where you click in Google search results – it could be damaging malware
    News

    Be careful where you click in Google search results – it could be damaging malware

    TechurzBy TechurzJuly 8, 2025Updated:May 11, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Global Warning. Alert Sign On World Map
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Arctic Wolf spotted SEO-optimized fake download pages
    • The sites spoofed PuTTY and WinSCP
    • Experts warn IT teams to be careful when downloading software

    Experts have uncovered a malicious campaign using SEO-optimized fake landing pages to deploy a malware loader called Oyster.

    Cybersecurity researchers Arctic Wolf found threat actors have created numerous landing pages that impersonate PuTTY and WinSCP, two popular Windows tools used to connect securely to remote servers.

    These pages are seemingly identical to their legitimate counterparts, and when people search on Google for these tools (mostly IT, cybersecurity, and web development professionals), they could be tricked into opening the wrong website. Since nothing on the sites would raise their suspicion, they might download the tool – which would work as intended, but it would also deliver Oyster, a known malware loader that is also sometimes called Broomstick, or CleanUpLoader.


    You may like

    Other software abused, too

    “Upon execution, a backdoor known as Oyster/Broomstick is installed,” Arctic Wolf explained. “Persistence is established by creating a scheduled task that runs every three minutes, executing a malicious DLL (twain_96.dll) via rundll32.exe using the DllRegisterServer export, indicating the use of DLL registration as part of the persistence mechanism.”

    Oyster is a stealthy malware loader used to deliver additional malicious payloads onto infected Windows systems, often as part of multi-stage attacks. It uses techniques like process injection, string obfuscation, and command-and-control via HTTPS to evade detection and maintain persistence.

    These are some of the fake websites used in the attacks:

    updaterputty[.]com
    zephyrhype[.]com
    putty[.]run
    putty[.]bet, and
    puttyy[.]org

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    While Arctic Wolf only mentioned PuTTY and WinSCP, it stressed that other tools may have been abused in the same manner, too. “While only Trojanized versions of PuTTY and WinSCP have been observed in this campaign, it is possible that additional tools may also be involved,” they said.

    Out of an abundance of caution, IT pros are advised to only download software from trusted sources, and to type in addresses themselves, rather than just googling them and clicking on the top result.

    Via The Hacker News

    You might also like

    careful Click damaging Google malware results search
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIDShield review | TechRadar
    Next Article Moonvalley’s ‘ethical’ AI video model for filmmakers is now publicly available
    Techurz
    • Website

    Related Posts

    Opinion

    Conntour raises $7M from General Catalyst, YC to build an AI search engine for security video systems

    March 26, 2026
    Opinion

    Delve did the security compliance on LiteLLM, an AI project hit by malware

    March 26, 2026
    Opinion

    Google, Accel India accelerator choses 5 startups and none are ‘AI wrappers’

    March 16, 2026
    Add A Comment
    Latest Tech Pulse

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    AI is becoming introspective – and that ‘should be monitored carefully,’ warns Anthropic

    November 3, 202512 Views
    Stay In Touch
    • YouTube
    • WhatsApp
    • Twitter
    • Pinterest
    • LinkedIn

    Techurz helps readers stay ahead of digital change with clear, practical, future-focused technology intelligence - written today, searched tomorrow.

    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    Company
    • About Us
    • Contact Us
    • Our Authors / Editorial Team
    • Write For Us
    • Advertise
    Policy
    • Editorial Policy
    • Privacy Policy
    • Terms and Conditions
    • Affiliate Disclosure
    • Cookie Policy
    • Disclaimer
    • DMCA
    Explore
    • AI Systems
    • Cyber Reality
    • Future Tech
    • Disruption Lab
    • Signals
    • Tech Pulse
    • Sitemap

    Join the Techurz Brief

    The future does not arrive suddenly.
    Stay ahead with fast, sharp tech signals.

    Type above and press Enter to search. Press Esc to cancel.